Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Urgent Alert: Protect Your Zyxel Devices from Newly Discovered UDP Port Exploit

by Jane Doe
June 17, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

If your company uses Zyxel networking products, it’s high time to act immediately after a wave of active exploitation attempts hit against a critical remote code execution (RCE) flaw (CVE-2023-28771).

Attackers are exploiting a vulnerability in Zyxel’s broadband customer premise equipment, which utilizes an insecure version of the Internet Key Exchange (IKE) protocol’s packet-decrypting function, which is made publicly available on UDP Port 500, to arbitrarily commandeer affected devices.

The vulnerability, which Zyxel patched on April 25, 2023, affects a range of Zyxel ATP, USG Flex, VPN and ZyWALL/USG series firewalls and VPNs, specifically versions V4. 60 to V5. 35, and ZyWall/USG V4. 60 to V4. 73).

While a patch is available, security firm GreyNoise has recently detected a localized spike in attack attempts on 16 June 2025, coming from hundreds of distinct IPs suggests an organized and alive campaign.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

A memory corruption condition is triggered as the unauthenticated attacker to run arbitrary operating system commands as root. This provides complete system compromise and has been associated with the recruiting of compromised devices into Mirai based botnet versions, typically for the purpose of conducting DDoS attacks.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) included this CVE in its Known Exploited Vulnerabilities Catalog, indicating its high and current threat level.

Recommendations for Defense

Zyxel device users and organizations are recommended to:

Patch Now: Update all affected Zyxel products to the final firmware release.

Review Exposure: Confirm that any Zyxel devices exposed to the internet are updated and configured correctly.

Monitor activity: Strongly monitor for any abnormal activity on impacted systems – searching for signs of botnet recruitment or compromise.

Restrict Access: As a best practice, configure routing and firewall access control policies or mechanisms in order to minimize the exposure of the IKE/UDP port 500.

The current wave of attacks targeting this well-known weakness in systems is a potent reminder that patching and security diligence are necessary to prevent the compromise of networks.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

June 23, 2025
Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.